Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Hunting Security Bugs | Tom Gallagher; Bryan Jeffries; Lawrence Landauer | Microsoft Press
- Coding for Penetration Testers | Jason Andress; Ryan Linn | Syngress
- Moving to the cloud developing apps in the new world of cloud computing | Sitaram, Dinkar | Syngress
- Hardware hacking : have fun while voiding your warranty | Syngress
- Security risk management building an information security risk management program from the ground up | Wheeler, Evan | Syngress
- OS X exploits and defense | Syngress
- Digital forensics with open source tools | Altheide, Cory | Syngress
- Digital forensics for legal professionals understanding digital evidence from the warrant to the courtroom | Daniel, Larry | Syngress
- Dissecting the hack : the forb1dd3n network | Syngress
- Securing the cloud cloud computer security techniques and tactics | Winkler, J. R. | Syngress
- Securing SQL server protecting your database from attackers | Cherry, Denny | Syngress
- Developer's guide to web application security | Cross, Michael | Syngress
- Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems | Knapp, Eric | Syngress
- The basics of hacking and penetration testing : ethical hacking and penetration testing made easy | Engebretson, Pat | Syngress
- Nmap in the enterprise : your guide to network scanning | Orebaugh, Angela | Syngress
- Seven deadliest USB attacks | Anderson, Brian | Syngress
- Android forensics investigation, analysis, and mobile security for Google Android | Hoog, Andrew | Syngress
- Unauthorised access : physical penetration testing for IT security teams | Allsopp, Wil
- Hack proofing your Web applications | Syngress
- # Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions | Davis, Michael A
- Malware forensics : investigating and analyzing malicious code | Aquilina, James M | Syngress
- SQL server forensic analysis | Fowler, Kevvie
- Windows forensic analysis toolkit | Carvey, Harlan A
- Xbox 360 forensics a digital forensics guide to examining artifacts | Bolt, Steven
- The basics of digital forensics the primer for getting started in digital forensics | Sammons, John | Syngress
- 19 deadly sins of software security : programming flaws and how to fix them | Howard, Michael
- Hacking : the next generation | Dhanjani, Nitesh
- The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice | Winterfeld, Steve | Syngress
- # Stealing the Network | Johnny Long
- Penetration tester's open source toolkit | Faircloth, Jeremy
- Metasploit toolkit for penetration testing, exploit development, and vulnerability research | Maynor, David
- Netcat power tools
- Cyber warfare techniques, tactics and tools for security practitioners | Andress, Jason
- Practical lock picking : a physical penetration tester's training guide | Ollam, Deviant
- Reverse engineering code with IDA Pro
- # Network forensics : tracking hackers through cyberspace | Davidoff, Sherri
- Darkmarket : cyberthieves, cybercops and you | Glenny, Misha
- Malware, rootkits & botnets : a beginner's guide | Elisan, Christopher C
- Traces of guilt : hunting our most dangerous computer criminals | Barrett, Neil
- Inside Wikileaks : my time with Julian Assange at the world's most dangerous website | Domscheit-Berg, Daniel
Advertisement
Add Comment
Please, Sign In to add comment